The document discusses server log files and the forensic tools and processes used to analyze them. It describes the key steps in the forensic process as securing the scene, investigating the scene by examining log files and other system evidence, gathering and correlating evidence, and building a hypothesis. It provides examples of different types of server log files that may contain useful information, such as WebLogic server logs, HTTP access logs, and JMS message logs. It also presents two case file examples involving issues like an unbalanced load and integration failures.
This session will provide a guide to Alfresco truststores and keystores. Several live examples will be shown, including the replacement of existing cryptographic stores or certificates. Additionally, a troubleshooting configuration guide for mTLS communication will be provided.
Deep Dive into Automating Oracle GoldenGate Using the New MicroservicesKal BO
Oracle open Word 2017 , please download it
in this session learn from Oracle Development and Product Management how to automate and embed Oracle GoldenGate using the new Oracle GoldenGate microservices. Learn how to embed and orchestrate Oracle GoldenGate for your use case similar to how Oracle Database sharding embeds and automates Oracle GoldenGate. Learn how to use the new conflict detection and resolution for active-active environments using the new integration with the database to automate this functionality.
Integrated Cloud Platform: Database, Integration
Code: CON6569
Session Type: Conference Session
SPEAKERS
Nick Wagner, Oracle
Volker Kuhr, Senior Principle Product Manager, Oracle
Jing Liu, Director, Development, Oracle
While traditional on-prem systems have always been a target from internal and external attackers, recent times have seen increased attacks on Hadoop cloud deployments. Hadoop systems are going to be increasingly targeted due to the large volume of data that it stores. Many Hadoop installations on cloud are publicly accessible without any security measures which pose threat to exfiltration of large datasets and possibly crypto-mining on this infrastructure with its huge distributed compute capability.
Apache Knox provides multiple layers of security related to authentication, service-level authorization and web application security controls out of the box for multiple Hadoop components.
Apache Knox provides configuration to prevent common OWASP Top 10 security risks e.g. Cross-site Request Forgery (CSRF), Cross Site Scripting (XSS), MIME Content Type sniffing, Clickjacking, etc. We will also discuss controls like HTTP Strict Transport Security which prevents SSL Downgrade attacks and CORS filter for allowing applications to make cross domain requests only to specifically allowed hosts through XHR. Support to include/exclude Cipher suites and exclude SSL protocols enables compliance with hardening guidelines provided by CIS for application servers.
Knox has several supported authentication mechanisms with Kerberos underneath e.g. LDAP over SSL, AD, PAM based auth for Unix users, integration with Identity Providers like Okta, etc. Also, capabilities like Trusted Proxy, Single Sign-On auth, Hostmap Provider, Identity Assertion Provider, Client Authentication enhances the overall security posture.
We will also cover the typical kill-chain methodology tailored to Hadoop ecosystem which will help formulate the preventive measures against future compromises.
This session will provide a guide to Alfresco truststores and keystores. Several live examples will be shown, including the replacement of existing cryptographic stores or certificates. Additionally, a troubleshooting configuration guide for mTLS communication will be provided.
Deep Dive into Automating Oracle GoldenGate Using the New MicroservicesKal BO
Oracle open Word 2017 , please download it
in this session learn from Oracle Development and Product Management how to automate and embed Oracle GoldenGate using the new Oracle GoldenGate microservices. Learn how to embed and orchestrate Oracle GoldenGate for your use case similar to how Oracle Database sharding embeds and automates Oracle GoldenGate. Learn how to use the new conflict detection and resolution for active-active environments using the new integration with the database to automate this functionality.
Integrated Cloud Platform: Database, Integration
Code: CON6569
Session Type: Conference Session
SPEAKERS
Nick Wagner, Oracle
Volker Kuhr, Senior Principle Product Manager, Oracle
Jing Liu, Director, Development, Oracle
While traditional on-prem systems have always been a target from internal and external attackers, recent times have seen increased attacks on Hadoop cloud deployments. Hadoop systems are going to be increasingly targeted due to the large volume of data that it stores. Many Hadoop installations on cloud are publicly accessible without any security measures which pose threat to exfiltration of large datasets and possibly crypto-mining on this infrastructure with its huge distributed compute capability.
Apache Knox provides multiple layers of security related to authentication, service-level authorization and web application security controls out of the box for multiple Hadoop components.
Apache Knox provides configuration to prevent common OWASP Top 10 security risks e.g. Cross-site Request Forgery (CSRF), Cross Site Scripting (XSS), MIME Content Type sniffing, Clickjacking, etc. We will also discuss controls like HTTP Strict Transport Security which prevents SSL Downgrade attacks and CORS filter for allowing applications to make cross domain requests only to specifically allowed hosts through XHR. Support to include/exclude Cipher suites and exclude SSL protocols enables compliance with hardening guidelines provided by CIS for application servers.
Knox has several supported authentication mechanisms with Kerberos underneath e.g. LDAP over SSL, AD, PAM based auth for Unix users, integration with Identity Providers like Okta, etc. Also, capabilities like Trusted Proxy, Single Sign-On auth, Hostmap Provider, Identity Assertion Provider, Client Authentication enhances the overall security posture.
We will also cover the typical kill-chain methodology tailored to Hadoop ecosystem which will help formulate the preventive measures against future compromises.
Improve PostgreSQL replication with Oracle GoldenGateBobby Curtis
PostgreSQL databases use the Write-Ahead Logging approach for the replication of data. At the same time, customers worldwide have asked for Oracle GoldenGate to support replication to and from PostgreSQL databases. The wait is over! This session will introduce Oracle GoldenGate for PostgreSQL and highlight what needs to be looked at to ensure successful replication for any PostgreSQL environment.
SSL certificates in the Oracle Database without surprisesNelson Calero
Presentation delivered on UKOUG conference in December 2019.
Abstract: Nowadays database installations are required to use secure connections to communicate with clients, from connecting to the database listener to interact with external services (for example to send emails from the database).
Also since a couple of years ago, it has been required to use stronger protocols like TLS 1.2 (SHA2 algorithm), which requires extra configuration in older database releases.
This presentation shows how SSL certificates work from a DBA perspective, which tools are available and examples of configuring and troubleshooting their usage from the Oracle database. It also explores the implications and how to implement TLS 1.2 and common errors found in real life usage.
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...Andrejs Vorobjovs
Experience in implementing SSL between Oracle DB and Oracle Clients" - presentation will explain how to configure implement SSL between Oracle DB/Client
As Hadoop becomes a critical part of Enterprise data infrastructure, securing Hadoop has become critically important. Enterprises want assurance that all their data is protected and that only authorized users have access to the relevant bits of information. In this session we will cover all aspects of Hadoop security including authentication, authorization, audit and data protection. We will also provide demonstration and detailed instructions for implementing comprehensive Hadoop security.
This presentation is based on a real life experience migrating Oracle E-Business Suite production to AWS.
We will talk about:
- Certification basics. Overview on supported configurations.
- How to build. Recommendations based on migration and 2 year production runtime experience.
- Advanced configurations.
- R12.2.
- Microsoft Azure and Oracle Cloud review. Quick comparison outline of main alternative platforms. How ready is Oracle's own cloud service.
- Scaling.
This is a very client demanding topic. Many are looking into cloud migration options and how they can optimize the cost compared to the on-premise hosting, and many misunderstand the complexity of Oracle EBS stack being capable for cloud deployment.
Securing Hadoop's REST APIs with Apache Knox Gateway Hadoop Summit June 6th, ...Kevin Minder
Securing Hadoop's REST APIs with Apache Knox Gateway
Presented at Hadoop Summit on June 6th, 2014
Describes the overall roles the Apache Knox Gateway plays in Hadoop security and briefly covers its primary features.
Fortifying Multi-Cluster Hybrid Cloud Data Lakes using Apache KnoxDataWorks Summit
Today enterprises are increasingly leveraging hybrid cloud data lakes while taking advantage of the elastic resources and services available in the public cloud. However, such gains come with risks and challenges in the areas of security and privacy. In this talk, we will cover how an enterprise can use Apache Knox as a secure point of entry into a Multi-cluster hybrid cloud data lakes. We will outline how enterprises can securely test out new big data applications or concepts in the public cloud while protecting their production clusters on-premises. We will show how enterprises can leverage their existing on-premises Active Directory infrastructure for authenticating users trying to access their services in the cloud. Further, we will cover how you can leverage Apache Knox Authorization to thwart an unauthorized access to a multi-cloud and multi-cluster data lake and bring to bear Multi Factor Authentication (MFA) on Apache Knox to block a hacker with stolen credentials. KIRAN MATTY, Senior Product Manager, Hortonworks and SANDEEP MORE, Sr. Software Engineer, Hortonworks
Best practices and lessons learnt from Running Apache NiFi at RenaultDataWorks Summit
No real-time insight without real-time data ingestion. No real-time data ingestion without NiFi ! Apache NiFi is an integrated platform for data flow management at entreprise level, enabling companies to securely acquire, process and analyze disparate sources of information (sensors, logs, files, etc) in real-time. NiFi helps data engineers accelerate the development of data flows thanks to its UI and a large number of powerful off-the-shelf processors. However, with great power comes great responsibilities. Behind the simplicity of NiFi, best practices must absolutely be respected in order to scale data flows in production & prevent sneaky situations. In this joint presentation, Hortonworks and Renault, a French car manufacturer, will present lessons learnt from real world projects using Apache NiFi. We will present NiFi design patterns to achieve high level performance and reliability at scale as well as the process to put in place around the technology for data flow governance. We will also show how these best practices can be implemented in practical use cases and scenarios.
Speakers
Kamelia Benchekroun, Data Lake Squad Lead, Renault Group
Abdelkrim Hadjidj, Solution Engineer, Hortonworks
Oracle Autonomous Health Framework (AHF) White PaperAnkita Khandelwal
Oracle 12c Release 2 introduces new Oracle Autonomous Health Framework, a collaborative framework whose components work 24x7 to autonomously to ensure continuous availability and consistent performance of database systems while minimizing human effort!
Automate your oracle cloud infrastructure operations v2.0 - OOW19Nelson Calero
Updated version for Oracle Open World 2019 of the same presentation done at Collaborate 2019
Abstract:
Oracle Cloud provides APIs and command-line utilities for handling your infrastructure in the cloud without using the web console. In addition, there are orchestration tools such as Terraform for building, changing, and versioning your infrastructure, enabling automation and configuration management. This session introduces Oracle Cloud Infrastructure services and APIs through examples from a DBA perspective: looking to minimize manual interventions when creating instances and containers, deploying a cluster with the Terraform Kubernetes installer, and backing up your databases. This presentation is an updated version of last year’s, including Oracle Cloud Infrastructure new-generation services and tools.
15 Troubleshooting Tips and Tricks for database 21c - OGBEMEA KSAOUGSandesh Rao
This session will focus on 15 troubleshooting tips and tricks for DBA’s covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA
Data in Hadoop is getting bigger every day, consumers of the data are growing, organizations are now looking at making their Hadoop cluster compliant to federal regulations and commercial demands. Apache Ranger simplifies the management of security policies across all components in Hadoop. Ranger provides granular access controls to data.
The deck describes what security tools are available in Hadoop and their purpose then it moves on to discuss in detail Apache Ranger.
Dataflow Management From Edge to Core with Apache NiFiDataWorks Summit
What is “dataflow?” — the process and tooling around gathering necessary information and getting it into a useful form to make insights available. Dataflow needs change rapidly — what was noise yesterday may be crucial data today, an API endpoint changes, or a service switches from producing CSV to JSON or Avro. In addition, developers may need to design a flow in a sandbox and deploy to QA or production — and those database passwords aren’t the same (hopefully). Learn about Apache NiFi — a robust and secure framework for dataflow development and monitoring.
Abstract: Identifying, collecting, securing, filtering, prioritizing, transforming, and transporting abstract data is a challenge faced by every organization. Apache NiFi and MiNiFi allow developers to create and refine dataflows with ease and ensure that their critical content is routed, transformed, validated, and delivered across global networks. Learn how the framework enables rapid development of flows, live monitoring and auditing, data protection and sharing. From IoT and machine interaction to log collection, NiFi can scale to meet the needs of your organization. Able to handle both small event messages and “big data” on the scale of terabytes per day, NiFi will provide a platform which lets both engineers and non-technical domain experts collaborate to solve the ingest and storage problems that have plagued enterprises.
Expected prior knowledge / intended audience: developers and data flow managers should be interested in learning about and improving their dataflow problems. The intended audience does not need experience in designing and modifying data flows.
Takeaways: Attendees will gain an understanding of dataflow concepts, data management processes, and flow management (including versioning, rollbacks, promotion between deployment environments, and various backing implementations).
Current uses: I am a committer and PMC member for the Apache NiFi, MiNiFi, and NiFi Registry projects and help numerous users deploy these tools to collect data from an incredibly diverse array of endpoints, aggregate, prioritize, filter, transform, and secure this data, and generate actionable insight from it. Current users of these platforms include many Fortune 100 companies, governments, startups, and individual users across fields like telecommunications, finance, healthcare, automotive, aerospace, and oil & gas, with use cases like fraud detection, logistics management, supply chain management, machine learning, IoT gateway, connected vehicles, smart grids, etc.
Speaker: Andy LoPresto, Sr. Member of Technical Staff, Hortonworks
Improve PostgreSQL replication with Oracle GoldenGateBobby Curtis
PostgreSQL databases use the Write-Ahead Logging approach for the replication of data. At the same time, customers worldwide have asked for Oracle GoldenGate to support replication to and from PostgreSQL databases. The wait is over! This session will introduce Oracle GoldenGate for PostgreSQL and highlight what needs to be looked at to ensure successful replication for any PostgreSQL environment.
SSL certificates in the Oracle Database without surprisesNelson Calero
Presentation delivered on UKOUG conference in December 2019.
Abstract: Nowadays database installations are required to use secure connections to communicate with clients, from connecting to the database listener to interact with external services (for example to send emails from the database).
Also since a couple of years ago, it has been required to use stronger protocols like TLS 1.2 (SHA2 algorithm), which requires extra configuration in older database releases.
This presentation shows how SSL certificates work from a DBA perspective, which tools are available and examples of configuring and troubleshooting their usage from the Oracle database. It also explores the implications and how to implement TLS 1.2 and common errors found in real life usage.
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...Andrejs Vorobjovs
Experience in implementing SSL between Oracle DB and Oracle Clients" - presentation will explain how to configure implement SSL between Oracle DB/Client
As Hadoop becomes a critical part of Enterprise data infrastructure, securing Hadoop has become critically important. Enterprises want assurance that all their data is protected and that only authorized users have access to the relevant bits of information. In this session we will cover all aspects of Hadoop security including authentication, authorization, audit and data protection. We will also provide demonstration and detailed instructions for implementing comprehensive Hadoop security.
This presentation is based on a real life experience migrating Oracle E-Business Suite production to AWS.
We will talk about:
- Certification basics. Overview on supported configurations.
- How to build. Recommendations based on migration and 2 year production runtime experience.
- Advanced configurations.
- R12.2.
- Microsoft Azure and Oracle Cloud review. Quick comparison outline of main alternative platforms. How ready is Oracle's own cloud service.
- Scaling.
This is a very client demanding topic. Many are looking into cloud migration options and how they can optimize the cost compared to the on-premise hosting, and many misunderstand the complexity of Oracle EBS stack being capable for cloud deployment.
Securing Hadoop's REST APIs with Apache Knox Gateway Hadoop Summit June 6th, ...Kevin Minder
Securing Hadoop's REST APIs with Apache Knox Gateway
Presented at Hadoop Summit on June 6th, 2014
Describes the overall roles the Apache Knox Gateway plays in Hadoop security and briefly covers its primary features.
Fortifying Multi-Cluster Hybrid Cloud Data Lakes using Apache KnoxDataWorks Summit
Today enterprises are increasingly leveraging hybrid cloud data lakes while taking advantage of the elastic resources and services available in the public cloud. However, such gains come with risks and challenges in the areas of security and privacy. In this talk, we will cover how an enterprise can use Apache Knox as a secure point of entry into a Multi-cluster hybrid cloud data lakes. We will outline how enterprises can securely test out new big data applications or concepts in the public cloud while protecting their production clusters on-premises. We will show how enterprises can leverage their existing on-premises Active Directory infrastructure for authenticating users trying to access their services in the cloud. Further, we will cover how you can leverage Apache Knox Authorization to thwart an unauthorized access to a multi-cloud and multi-cluster data lake and bring to bear Multi Factor Authentication (MFA) on Apache Knox to block a hacker with stolen credentials. KIRAN MATTY, Senior Product Manager, Hortonworks and SANDEEP MORE, Sr. Software Engineer, Hortonworks
Best practices and lessons learnt from Running Apache NiFi at RenaultDataWorks Summit
No real-time insight without real-time data ingestion. No real-time data ingestion without NiFi ! Apache NiFi is an integrated platform for data flow management at entreprise level, enabling companies to securely acquire, process and analyze disparate sources of information (sensors, logs, files, etc) in real-time. NiFi helps data engineers accelerate the development of data flows thanks to its UI and a large number of powerful off-the-shelf processors. However, with great power comes great responsibilities. Behind the simplicity of NiFi, best practices must absolutely be respected in order to scale data flows in production & prevent sneaky situations. In this joint presentation, Hortonworks and Renault, a French car manufacturer, will present lessons learnt from real world projects using Apache NiFi. We will present NiFi design patterns to achieve high level performance and reliability at scale as well as the process to put in place around the technology for data flow governance. We will also show how these best practices can be implemented in practical use cases and scenarios.
Speakers
Kamelia Benchekroun, Data Lake Squad Lead, Renault Group
Abdelkrim Hadjidj, Solution Engineer, Hortonworks
Oracle Autonomous Health Framework (AHF) White PaperAnkita Khandelwal
Oracle 12c Release 2 introduces new Oracle Autonomous Health Framework, a collaborative framework whose components work 24x7 to autonomously to ensure continuous availability and consistent performance of database systems while minimizing human effort!
Automate your oracle cloud infrastructure operations v2.0 - OOW19Nelson Calero
Updated version for Oracle Open World 2019 of the same presentation done at Collaborate 2019
Abstract:
Oracle Cloud provides APIs and command-line utilities for handling your infrastructure in the cloud without using the web console. In addition, there are orchestration tools such as Terraform for building, changing, and versioning your infrastructure, enabling automation and configuration management. This session introduces Oracle Cloud Infrastructure services and APIs through examples from a DBA perspective: looking to minimize manual interventions when creating instances and containers, deploying a cluster with the Terraform Kubernetes installer, and backing up your databases. This presentation is an updated version of last year’s, including Oracle Cloud Infrastructure new-generation services and tools.
15 Troubleshooting Tips and Tricks for database 21c - OGBEMEA KSAOUGSandesh Rao
This session will focus on 15 troubleshooting tips and tricks for DBA’s covering tools from the Oracle Autonomous Health Framework (AHF) like Trace file Analyzer (TFA) to collect , organize and analyze log data , Exachk and orachk to perform mass best practices analysis and automation , Cluster Health Advisor to debug node evictions and calibrate the framework , OSWatcher and its analysis engine , oratop for pinpointing performance issues and many others to make one feel like a rockstar DBA
Data in Hadoop is getting bigger every day, consumers of the data are growing, organizations are now looking at making their Hadoop cluster compliant to federal regulations and commercial demands. Apache Ranger simplifies the management of security policies across all components in Hadoop. Ranger provides granular access controls to data.
The deck describes what security tools are available in Hadoop and their purpose then it moves on to discuss in detail Apache Ranger.
Dataflow Management From Edge to Core with Apache NiFiDataWorks Summit
What is “dataflow?” — the process and tooling around gathering necessary information and getting it into a useful form to make insights available. Dataflow needs change rapidly — what was noise yesterday may be crucial data today, an API endpoint changes, or a service switches from producing CSV to JSON or Avro. In addition, developers may need to design a flow in a sandbox and deploy to QA or production — and those database passwords aren’t the same (hopefully). Learn about Apache NiFi — a robust and secure framework for dataflow development and monitoring.
Abstract: Identifying, collecting, securing, filtering, prioritizing, transforming, and transporting abstract data is a challenge faced by every organization. Apache NiFi and MiNiFi allow developers to create and refine dataflows with ease and ensure that their critical content is routed, transformed, validated, and delivered across global networks. Learn how the framework enables rapid development of flows, live monitoring and auditing, data protection and sharing. From IoT and machine interaction to log collection, NiFi can scale to meet the needs of your organization. Able to handle both small event messages and “big data” on the scale of terabytes per day, NiFi will provide a platform which lets both engineers and non-technical domain experts collaborate to solve the ingest and storage problems that have plagued enterprises.
Expected prior knowledge / intended audience: developers and data flow managers should be interested in learning about and improving their dataflow problems. The intended audience does not need experience in designing and modifying data flows.
Takeaways: Attendees will gain an understanding of dataflow concepts, data management processes, and flow management (including versioning, rollbacks, promotion between deployment environments, and various backing implementations).
Current uses: I am a committer and PMC member for the Apache NiFi, MiNiFi, and NiFi Registry projects and help numerous users deploy these tools to collect data from an incredibly diverse array of endpoints, aggregate, prioritize, filter, transform, and secure this data, and generate actionable insight from it. Current users of these platforms include many Fortune 100 companies, governments, startups, and individual users across fields like telecommunications, finance, healthcare, automotive, aerospace, and oil & gas, with use cases like fraud detection, logistics management, supply chain management, machine learning, IoT gateway, connected vehicles, smart grids, etc.
Speaker: Andy LoPresto, Sr. Member of Technical Staff, Hortonworks
Use Case for Financial Industry using Mule ESB. This is a unique project and use case that shows, using light weight ESB like Mule it is easy to adapt and scale out on utility hardware. Besides just scale out, it is easy to migrate from a legacy batch based applications into a work flow enabled, Active-Active applications.
The AMIS Report from Oracle Open World and JavaOne 2011 - Part OneLucas Jellema
The first part of the report from the AMIS team on their findings of Oracle Open World 2011 and JavaOne 2011. With the major announcements, the roadmaps, highlights and disappointments, some gold nuggets and personal bests and a general impression of where Oracle, the industry trends and the technology are going.
Monitoring in Motion: Monitoring Containers and Amazon ECSAmazon Web Services
Containers and other forms of dynamic infrastructure can prove challenging to monitor. How do you define normal, when your infrastructure is intentionally in motion and change from minute to minute? Join us as we discuss proven strategies for monitoring your containerized infrastructure on AWS and ECS.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
Developer and Fusion Middleware 1 _ Kevin Powe _ Log files - a wealth of forensic evidence.pdf
1. Log
files:
A
wealth
of
forensic
evidence
Kevin
Powe
Integral
Technology
Solu6ons
The most comprehensive Oracle applications & technology content under one roof
2. More
info
at
h:p://bit.ly/kapowelogs
The most comprehensive Oracle applications & technology content under one roof
4. The Forensic Process
The most comprehensive Oracle applications & technology content under one roof
5. Step One: Secure The Scene
The most comprehensive Oracle applications & technology content under one roof
6. Operating System Evidence
netstat
for
network
issues
top
or
Windows
Task
Manager
for
CPU
issues
iostat
or
vmstat
for
I/O
issues
The most comprehensive Oracle applications & technology content under one roof
7. Rolling Log Files
The most comprehensive Oracle applications & technology content under one roof
8. Cause Symptoms
2-‐4PM
4-‐6PM
The most comprehensive Oracle applications & technology content under one roof
9. Step Two: Investigate The Scene
The most comprehensive Oracle applications & technology content under one roof
11.
‘Error’
versus
‘Warning’
‘Failing’
versus
‘Failed’
The most comprehensive Oracle applications & technology content under one roof
12. Step Three: Gather And Correlate
Evidence
The most comprehensive Oracle applications & technology content under one roof
13. Step Four: Build A Hypothesis
The most comprehensive Oracle applications & technology content under one roof
14. 1) Secure the scene
2) Investigate the scene
3) Gather and correlate evidence
4) Build a hypothesis
The most comprehensive Oracle applications & technology content under one roof
16. WebLogic
Server
Domain
AdminServer
managedServer1
Java
managedServer2
processes
The most comprehensive Oracle applications & technology content under one roof
17. HTTP Access Logs
The most comprehensive Oracle applications & technology content under one roof
18. 192.168.5.6
-‐
-‐
[19/Nov/2010:13:34:49
+0800]
"POST
/AccountServices/ProxyServices/AccountServices
HTTP/1.1"
200
29487
192.168.5.6
-‐
-‐
[19/Nov/2010:13:34:49
+0800]
"POST
/WarehousingServices/ProxyServices/RequestOrderDetails
HTTP/1.1"
200
1167
rfc931
date
Remote
host
authuser
192.168.5.6
-‐
-‐
[19/Nov/2010:13:34:49
+0800]
request
"POST
/WarehousingServices/ProxyServices/RequestOrderDetails
HTTP/1.1“
status
bytes
200
1167
The most comprehensive Oracle applications & technology content under one roof
19. ELF = Extended Logging Format
The most comprehensive Oracle applications & technology content under one roof
20. Extended Logging Format Fields
Common
format
fields
Request
fields
date
cs-‐method
6me
cs-‐uri
bytes
cs-‐uri-‐stem
sc-‐status
cs-‐uri-‐query
Network
fields
The
Good
Stuff
c-‐ip
cs-‐comment
s-‐ip
6me-‐taken
c-‐dns
custom
s-‐dns
The most comprehensive Oracle applications & technology content under one roof
21. Server log files
The most comprehensive Oracle applications & technology content under one roof
23. ####<2/08/2011
12:49:35
AM
EST>
<No6ce>
<Server>
<brother-‐eye>
<AdminServer>
<[ACTIVE]
ExecuteThread:
'0'
for
queue:
'weblogic.kernel.Default
(self-‐tuning)'>
<<WLS
Kernel>>
<>
<>
<1312210175933>
<BEA-‐002613>
<Channel
"Default"
is
now
listening
on
10.0.2.15:7001
for
protocols
iiop,
t3,
ldap,
snmp,
h:p.>
####<2/08/2011
12:49:35
AM
EST>
<No6ce>
<WebLogicServer>
<brother-‐eye>
<AdminServer>
<[ACTIVE]
ExecuteThread:
'0'
for
queue:
'weblogic.kernel.Default
(self-‐tuning)'>
<<WLS
Kernel>>
<>
<>
<1312210175933>
<BEA-‐000331>
<Started
WebLogic
Admin
Server
"AdminServer"
for
domain
"example1030Domain"
running
in
Development
Mode>
Timestamp
Severity
Subsystem
Machine
<2/08/2011
12:49:35
AM
EST>
<Nodce>
<WebLogicServer>
<brother-‐eye>
Server
Thread
ID
<AdminServer>
<[ACTIVE]
ExecuteThread:
'0'
for
queue:
'weblogic.kernel.Default
(self-‐tuning)'>
User
Txn
ID
Diagn.
Time
(msecs)
Message
ID
Text
<<WLS
Kernel>>
<>
<>
<1312210175933>
<BEA-‐002613>
<Channel
"Default"
is
The most comprehensive Oracle applications & technology content under one roof
24. Debug flags
The most comprehensive Oracle applications & technology content under one roof
25.
HTTP:
weblogic.servlet.DebugH:p
SSL:
default.DebugSSL
JDBC:
weblogic.jdbc.sql.DebugJDBCSQL
The most comprehensive Oracle applications & technology content under one roof
26. <4/08/2011
07:47:35
PM
EST>
<Warning>
<netuix>
<BEA-‐423420>
<Redirect
is
executed
in
begin
or
refresh
ac6on.
Redirect
url
is
/console/console.portal?_nfpb=true&_pageLabel=HomePage1.>
Loaded
index.jsp
page
Loaded
index.jsp
page
Loaded
index.jsp
page
<4/08/2011
23:20:34
PM
EST>
<Info>
<Health>
<brother-‐eye>
<AdminServer>
<weblogic.GCMonitor>
<<anonymous>>
<>
<>
<1311830434630>
<BEA-‐310002>
<86%
of
the
total
memory
in
the
server
is
free>
TO
<4/08/2011
07:53:38
PM
EST>
<No6ce>
<WebLogicServer>
<BEA-‐000365>
<Server
state
changed
to
RUNNING>
<4/08/2011
07:53:38
PM
EST>
<No6ce>
<WebLogicServer>
<BEA-‐000360>
<Server
started
in
RUNNING
mode>
<4/08/2011
07:53:49
PM
EST>
<Nodce>
<Stdout>
<BEA-‐000000>
<Loaded
index.jsp
page>
<4/08/2011
07:53:50
PM
EST>
<Nodce>
<Stdout>
<BEA-‐000000>
<Loaded
index.jsp
page>
<4/08/2011
07:53:51
PM
EST>
<Nodce>
<Stdout>
<BEA-‐000000>
<Loaded
index.jsp
page>
<4/08/2011
08:20:34
PM
EST>
<Info>
<Health>
<brother-‐eye>
<AdminServer>
<weblogic.GCMonitor>
<<anonymous>>
<>
<>
<1311830434630>
<BEA-‐310002>
<86%
of
the
total
memory
in
the
server
is
free>
The most comprehensive Oracle applications & technology content under one roof
27. Oracle Service Bus tracing
The most comprehensive Oracle applications & technology content under one roof
28. JMS Message Logs
The most comprehensive Oracle applications & technology content under one roof
29. SOA Suite Diagnostic Logs
The most comprehensive Oracle applications & technology content under one roof
31. Case File #1
An Unbalanced Load
The most comprehensive Oracle applications & technology content under one roof
32. Sun
Reverse
WebLogic
Server
Proxy
Load
balancer
Sun
Reverse
WebLogic
Server
Proxy
The most comprehensive Oracle applications & technology content under one roof
33. cat
access.log*
|
awk
‘{
print
$x
}’
|
sort
|
uniq
(where
x
=
posi-on
of
the
cookie
in
the
log
file)
The most comprehensive Oracle applications & technology content under one roof
34. Case File #2
Fear Of Commitment
The most comprehensive Oracle applications & technology content under one roof
35. Oracle
Service
Bus
Tuxedo
The most comprehensive Oracle applications & technology content under one roof
37. Tools
Editors
Querying
data
Analysis
The
Gun
find
Excel
vi
grep
R
sed
Splunk
awk
tail
The most comprehensive Oracle applications & technology content under one roof
38. @kapowe
kevinpowe
kapowe
The most comprehensive Oracle applications & technology content under one roof